From 18287169c3fadd700d5a1f81c108bf720eeb077a Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 18:27:48 -0500 Subject: [PATCH 01/10] docs: swap details / fr in 8.5.3 --- source/tests/Test-OrgOnlyBypassLobby.ps1 | 16 +++++++--------- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/source/tests/Test-OrgOnlyBypassLobby.ps1 b/source/tests/Test-OrgOnlyBypassLobby.ps1 index 87b7d24..2f6f208 100644 --- a/source/tests/Test-OrgOnlyBypassLobby.ps1 +++ b/source/tests/Test-OrgOnlyBypassLobby.ps1 @@ -39,22 +39,20 @@ function Test-OrgOnlyBypassLobby { # Prepare failure reasons and details based on compliance $failureReasons = if (-not $lobbyBypassRestricted) { - # Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is not set to `EveryoneInCompanyExcludingGuests`. - "External participants can bypass the lobby" - } - else { + # Condition C: Verification using the Microsoft Teams admin center indicates that the meeting join & lobby settings are not configured as recommended. + "AutoAdmittedUsers is set to $($CsTeamsMeetingPolicyLobby.AutoAdmittedUsers)" + + }else { "N/A" } $details = if ($lobbyBypassRestricted) { # Condition B: The setting for "Who can bypass the lobby" is configured to "People in my org" using the UI. "Only people in the organization can bypass the lobby." + }else { + # Condition A: The `AutoAdmittedUsers` setting in the Teams meeting policy is not set to `EveryoneInCompanyExcludingGuests`. + "External participants can bypass the lobby" } - else { - # Condition C: Verification using the Microsoft Teams admin center indicates that the meeting join & lobby settings are not configured as recommended. - "AutoAdmittedUsers is set to $($CsTeamsMeetingPolicyLobby.AutoAdmittedUsers)" - } - # Create and populate the CISAuditResult object $params = @{ Rec = $recnum From 0a92100bb6b153d2e332eaf06275d59335812461 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 19:14:43 -0500 Subject: [PATCH 02/10] fix: 8.6.1 test logic and output --- source/Private/Get-CISExoOutput.ps1 | 2 +- source/tests/Test-ReportSecurityInTeams.ps1 | 46 +++++++++++++++++---- 2 files changed, 39 insertions(+), 9 deletions(-) diff --git a/source/Private/Get-CISExoOutput.ps1 b/source/Private/Get-CISExoOutput.ps1 index ac8280e..9f95f1e 100644 --- a/source/Private/Get-CISExoOutput.ps1 +++ b/source/Private/Get-CISExoOutput.ps1 @@ -284,7 +284,7 @@ function Get-CISExoOutput { # Retrieve the necessary settings for Teams and Exchange Online # Condition B: Verify that 'Monitor reported messages in Microsoft Teams' is checked in the Microsoft 365 Defender portal. # Condition C: Ensure the 'Send reported messages to' setting in the Microsoft 365 Defender portal is set to 'My reporting mailbox only' with the correct report email addresses. - $ReportSubmissionPolicy = Get-ReportSubmissionPolicy | Select-Object -Property ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress, ReportChatMessageToCustomizedAddressEnabled + $ReportSubmissionPolicy = Get-ReportSubmissionPolicy | Select-Object -Property ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress,ReportJunkAddresses,ReportNotJunkAddresses,ReportPhishAddresses,ReportChatMessageEnabled,ReportChatMessageToCustomizedAddressEnabled return $ReportSubmissionPolicy } default { throw "No match found for test: $Rec" } diff --git a/source/tests/Test-ReportSecurityInTeams.ps1 b/source/tests/Test-ReportSecurityInTeams.ps1 index 0247956..026b185 100644 --- a/source/tests/Test-ReportSecurityInTeams.ps1 +++ b/source/tests/Test-ReportSecurityInTeams.ps1 @@ -30,21 +30,51 @@ function Test-ReportSecurityInTeams { $ReportSubmissionPolicy.ReportJunkToCustomizedAddress -and $ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress -and $ReportSubmissionPolicy.ReportPhishToCustomizedAddress -and - $ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled + $null -ne $ReportSubmissionPolicy.ReportJunkAddresses -and + $null -ne $ReportSubmissionPolicy.ReportNotJunkAddresses -and + $null -ne $ReportSubmissionPolicy.ReportPhishAddresses -and + $ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled -and + -not $ReportSubmissionPolicy.ReportChatMessageEnabled + $faildetailstring = @" +The following settings are required for users to report security concerns in Teams: + +MS Teams: +AllowSecurityEndUserReporting: True + +EXO: +ReportJunkToCustomizedAddress : True +ReportNotJunkToCustomizedAddress : True +ReportPhishToCustomizedAddress : True +ReportJunkAddresses : +ReportNotJunkAddresses : +ReportPhishAddresses : +ReportChatMessageEnabled : False +ReportChatMessageToCustomizedAddressEnabled : True +"@ + $detailsString = "Users cannot report security concerns in Teams due to one or more incorrect settings:`n`n" + + "MSTeams: AllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); `n" + + "EXO: ReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); `n" + + "EXO: ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); `n" + + "EXO: ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); `n" + + "EXO: ReportJunkAddresses: $($ReportSubmissionPolicy.ReportJunkAddresses -join ', '); `n" + + "EXO: ReportNotJunkAddresses: $($ReportSubmissionPolicy.ReportNotJunkAddresses -join ', '); `n" + + "EXO: ReportPhishAddresses: $($ReportSubmissionPolicy.ReportPhishAddresses -join ', '); `n" + + "EXO: ReportChatMessageEnabled: $($ReportSubmissionPolicy.ReportChatMessageEnabled); `n" + + "EXO: ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled); " # Prepare failure reasons and details based on compliance $failureReasons = if (-not $securityReportEnabled) { - "Users cannot report security concerns in Teams due to one or more incorrect settings" + $detailsString } else { "N/A" } - - $details = "AllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); " + - "ReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); " + - "ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); " + - "ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); " + - "ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled)" + $details = if ($securityReportEnabled) { + "Users can report security concerns in Teams." + } + else { + $faildetailstring + } # Create and populate the CISAuditResult object $params = @{ From 73bce280ebd09429e2732859441c6dd3de703d26 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 19:15:15 -0500 Subject: [PATCH 03/10] docs: Update Help --- help/about_M365FoundationsCISReport.md | 20 +++++++++---------- helpers/Build-Help.ps1 | 4 ++-- .../about_M365FoundationsCISReport.help.txt | 20 +++++++++---------- 3 files changed, 22 insertions(+), 22 deletions(-) diff --git a/help/about_M365FoundationsCISReport.md b/help/about_M365FoundationsCISReport.md index 9cd1fed..6a2e671 100644 --- a/help/about_M365FoundationsCISReport.md +++ b/help/about_M365FoundationsCISReport.md @@ -16,23 +16,23 @@ The module includes functionality to synchronize audit results with CIS benchmar # EXAMPLES ```powershell -# Example 1: Exporting a security audit table to a CSV file -Export-M365SecurityAuditTable -OutputPath "C:\AuditReports\SecurityAudit.csv" +# Example 1: Performing a security audit based on CIS benchmarks +$auditResults = Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" -# Example 2: Retrieving licenses for users in administrative roles -Get-AdminRoleUserLicense -RoleName "Global Administrator" +# Example 2: Exporting a security audit table to a CSV file +Export-M365SecurityAuditTable -ExportAllTests -AuditResults $auditResults -ExportPath "C:\temp" -ExportOriginalTests -# Example 3: Getting MFA status of users -Get-MFAStatus -UserPrincipalName "user@domain.com" +# Example 3: Retrieving licenses for users in administrative roles +Get-AdminRoleUserLicense -# Example 4: Performing a security audit based on CIS benchmarks -Invoke-M365SecurityAudit -OutputPath "C:\AuditReports\AuditResults.xlsx" +# Example 4: Getting MFA status of users +Get-MFAStatus -UserId "user@domain.com" # Example 5: Removing rows with empty status values from a CSV file -Remove-RowsWithEmptyCSVStatus -InputPath "C:\AuditReports\AuditResults.csv" -OutputPath "C:\AuditReports\CleanedResults.csv" +Remove-RowsWithEmptyCSVStatus -FilePath "C:\Reports\Report.xlsx" -WorksheetName "Sheet1" # Example 6: Synchronizing CIS benchmark data with audit results -Sync-CISExcelAndCsvData -ExcelPath "C:\CISBenchmarks\CISBenchmark.xlsx" -CsvPath "C:\AuditReports\AuditResults.csv" +Sync-CISExcelAndCsvData -ExcelPath "path\to\excel.xlsx" -CsvPath "path\to\data.csv" -SheetName "Combined Profiles" ``` # NOTE diff --git a/helpers/Build-Help.ps1 b/helpers/Build-Help.ps1 index c0d4383..ef68208 100644 --- a/helpers/Build-Help.ps1 +++ b/helpers/Build-Help.ps1 @@ -37,6 +37,6 @@ $parameters = @{ LogPath = ".\log.txt" Encoding = [System.Text.Encoding]::UTF8 } -Update-MarkdownHelpModule @parameters -Update-MarkdownHelpModule -Path ".\help" -RefreshModulePage +Update-MarkdownHelpModule @parameters -Force +Update-MarkdownHelpModule -Path ".\help" -RefreshModulePage -Force New-ExternalHelp -Path ".\help" -OutputPath ".\source\en-US" -force \ No newline at end of file diff --git a/source/en-US/about_M365FoundationsCISReport.help.txt b/source/en-US/about_M365FoundationsCISReport.help.txt index a2c3532..2dc01a1 100644 --- a/source/en-US/about_M365FoundationsCISReport.help.txt +++ b/source/en-US/about_M365FoundationsCISReport.help.txt @@ -28,23 +28,23 @@ Optional Subtopics is always up-to-date with the latest audit findings. EXAMPLES - # Example 1: Exporting a security audit table to a CSV file - Export-M365SecurityAuditTable -OutputPath "C:\AuditReports\SecurityAudit.csv" + # Example 1: Performing a security audit based on CIS benchmarks + $auditResults = Invoke-M365SecurityAudit -TenantAdminUrl "https://contoso-admin.sharepoint.com" - # Example 2: Retrieving licenses for users in administrative roles - Get-AdminRoleUserLicense -RoleName "Global Administrator" + # Example 2: Exporting a security audit table to a CSV file + Export-M365SecurityAuditTable -ExportAllTests -AuditResults $auditResults -ExportPath "C:\temp" -ExportOriginalTests - # Example 3: Getting MFA status of users - Get-MFAStatus -UserPrincipalName "user@domain.com" + # Example 3: Retrieving licenses for users in administrative roles + Get-AdminRoleUserLicense - # Example 4: Performing a security audit based on CIS benchmarks - Invoke-M365SecurityAudit -OutputPath "C:\AuditReports\AuditResults.xlsx" + # Example 4: Getting MFA status of users + Get-MFAStatus -UserId "user@domain.com" # Example 5: Removing rows with empty status values from a CSV file - Remove-RowsWithEmptyCSVStatus -InputPath "C:\AuditReports\AuditResults.csv" -OutputPath "C:\AuditReports\CleanedResults.csv" + Remove-RowsWithEmptyCSVStatus -FilePath "C:\Reports\Report.xlsx" -WorksheetName "Sheet1" # Example 6: Synchronizing CIS benchmark data with audit results - Sync-CISExcelAndCsvData -ExcelPath "C:\CISBenchmarks\CISBenchmark.xlsx" -CsvPath "C:\AuditReports\AuditResults.csv" + Sync-CISExcelAndCsvData -ExcelPath "path\to\excel.xlsx" -CsvPath "path\to\data.csv" -SheetName "Combined Profiles" NOTE Ensure that you have the necessary permissions and administrative roles in From fd53384f8e51d4d025b50db7fe5f3f205fe9e462 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 19:19:29 -0500 Subject: [PATCH 04/10] docs: Update CHANGELOG --- CHANGELOG.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index a2b3a73..453b42f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,6 +4,14 @@ The format is based on and uses the types of changes according to [Keep a Change ## [Unreleased] +### Fixed + +- Fixed test 8.6.1 to include all of the following properties in it's checks and output: ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress,ReportJunkAddresses,ReportNotJunkAddresses,ReportPhishAddresses,ReportChatMessageEnabled,ReportChatMessageToCustomizedAddressEnabled + +### Changed + +- Changed output of failure reason and details for 8.5.3 to be in line with other tests. + ## [0.1.14] - 2024-06-23 ### Fixed From 143ee69fb5abf0bd3c2e19991fd8d7642901c158 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 19:22:17 -0500 Subject: [PATCH 05/10] fix: 8.6.1 test logic and output --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 453b42f..e514d29 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -7,6 +7,7 @@ The format is based on and uses the types of changes according to [Keep a Change ### Fixed - Fixed test 8.6.1 to include all of the following properties in it's checks and output: ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress,ReportJunkAddresses,ReportNotJunkAddresses,ReportPhishAddresses,ReportChatMessageEnabled,ReportChatMessageToCustomizedAddressEnabled +- Help about_M365FoundationsCISReport examples. ### Changed From c4bbf25e8bfd19d09acf4610518f0705fcfbba44 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Mon, 24 Jun 2024 19:24:15 -0500 Subject: [PATCH 06/10] docs: Update CHANGELOG --- CHANGELOG.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index e514d29..2eb0e4b 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -6,8 +6,8 @@ The format is based on and uses the types of changes according to [Keep a Change ### Fixed -- Fixed test 8.6.1 to include all of the following properties in it's checks and output: ReportJunkToCustomizedAddress, ReportNotJunkToCustomizedAddress, ReportPhishToCustomizedAddress,ReportJunkAddresses,ReportNotJunkAddresses,ReportPhishAddresses,ReportChatMessageEnabled,ReportChatMessageToCustomizedAddressEnabled -- Help about_M365FoundationsCISReport examples. +- Fixed test 8.6.1 to include all of the following properties in it's checks and output: `ReportJunkToCustomizedAddress`, `ReportNotJunkToCustomizedAddress`, `ReportPhishToCustomizedAddress`,`ReportJunkAddresses`,`ReportNotJunkAddresses`,`ReportPhishAddresses`,`ReportChatMessageEnabled`,`ReportChatMessageToCustomizedAddressEnabled` +- Fixed help `about_M365FoundationsCISReport` examples. ### Changed From 51f662ff581431d26bb57983e1a9e214cea87366 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Wed, 26 Jun 2024 08:54:32 -0500 Subject: [PATCH 07/10] Fix: 8.6.1 output and formatting in line with recommendation --- source/tests/Test-ReportSecurityInTeams.ps1 | 38 ++++++++++----------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/source/tests/Test-ReportSecurityInTeams.ps1 b/source/tests/Test-ReportSecurityInTeams.ps1 index 026b185..589fa6f 100644 --- a/source/tests/Test-ReportSecurityInTeams.ps1 +++ b/source/tests/Test-ReportSecurityInTeams.ps1 @@ -36,32 +36,32 @@ function Test-ReportSecurityInTeams { $ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled -and -not $ReportSubmissionPolicy.ReportChatMessageEnabled - $faildetailstring = @" + $detailsString = @" The following settings are required for users to report security concerns in Teams: MS Teams: AllowSecurityEndUserReporting: True EXO: -ReportJunkToCustomizedAddress : True -ReportNotJunkToCustomizedAddress : True -ReportPhishToCustomizedAddress : True -ReportJunkAddresses : -ReportNotJunkAddresses : -ReportPhishAddresses : -ReportChatMessageEnabled : False -ReportChatMessageToCustomizedAddressEnabled : True +ReportJunkToCustomizedAddress: True +ReportNotJunkToCustomizedAddress: True +ReportPhishToCustomizedAddress: True +ReportJunkAddresses: +ReportNotJunkAddresses: +ReportPhishAddresses: +ReportChatMessageEnabled: False +ReportChatMessageToCustomizedAddressEnabled: True "@ - $detailsString = "Users cannot report security concerns in Teams due to one or more incorrect settings:`n`n" + - "MSTeams: AllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); `n" + - "EXO: ReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); `n" + - "EXO: ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); `n" + - "EXO: ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); `n" + - "EXO: ReportJunkAddresses: $($ReportSubmissionPolicy.ReportJunkAddresses -join ', '); `n" + - "EXO: ReportNotJunkAddresses: $($ReportSubmissionPolicy.ReportNotJunkAddresses -join ', '); `n" + - "EXO: ReportPhishAddresses: $($ReportSubmissionPolicy.ReportPhishAddresses -join ', '); `n" + - "EXO: ReportChatMessageEnabled: $($ReportSubmissionPolicy.ReportChatMessageEnabled); `n" + - "EXO: ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled); " + $faildetailstring = "Users cannot report security concerns in Teams due to one or more of the found incorrect settings:`n`n" + + "MSTeams: `nAllowSecurityEndUserReporting: $($CsTeamsMessagingPolicy.AllowSecurityEndUserReporting); `n`n" + + "EXO: `nReportJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportJunkToCustomizedAddress); `n" + + "ReportNotJunkToCustomizedAddress: $($ReportSubmissionPolicy.ReportNotJunkToCustomizedAddress); `n" + + "ReportPhishToCustomizedAddress: $($ReportSubmissionPolicy.ReportPhishToCustomizedAddress); `n" + + "ReportJunkAddresses: $($ReportSubmissionPolicy.ReportJunkAddresses -join ', '); `n" + + "ReportNotJunkAddresses: $($ReportSubmissionPolicy.ReportNotJunkAddresses -join ', '); `n" + + "ReportPhishAddresses: $($ReportSubmissionPolicy.ReportPhishAddresses -join ', '); `n" + + "ReportChatMessageEnabled: $($ReportSubmissionPolicy.ReportChatMessageEnabled); `n" + + "ReportChatMessageToCustomizedAddressEnabled: $($ReportSubmissionPolicy.ReportChatMessageToCustomizedAddressEnabled); " # Prepare failure reasons and details based on compliance $failureReasons = if (-not $securityReportEnabled) { $detailsString From 59278f4a27331148f97f28f040acf81f6ec2d8f0 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Wed, 26 Jun 2024 08:54:57 -0500 Subject: [PATCH 08/10] Fix: Export when tests with nested tables not included. --- source/Public/Export-M365SecurityAuditTable.ps1 | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/source/Public/Export-M365SecurityAuditTable.ps1 b/source/Public/Export-M365SecurityAuditTable.ps1 index 8542ebb..fbe507b 100644 --- a/source/Public/Export-M365SecurityAuditTable.ps1 +++ b/source/Public/Export-M365SecurityAuditTable.ps1 @@ -191,7 +191,7 @@ function Export-M365SecurityAuditTable { } else { if ($ExportOriginalTests) { - Write-Information "No specified tests were included in the export other than the full audit results." -InformationAction Continue + Write-Information "Full audit results exported however, none of the following tests had exports: `n1.1.1, 1.3.1, 6.1.2, 6.1.3, 7.3.4" -InformationAction Continue } else { Write-Information "No specified tests were included in the export." -InformationAction Continue @@ -201,9 +201,12 @@ function Export-M365SecurityAuditTable { if ($ExportOriginalTests) { # Define the test numbers to check $TestNumbersToCheck = "1.1.1", "1.3.1", "6.1.2", "6.1.3", "7.3.4" - - # Check for large details and update the AuditResults array - $updatedAuditResults = Get-ExceededLengthResultDetail -AuditResults $AuditResults -TestNumbersToCheck $TestNumbersToCheck -ExportedTests $exportedTests -DetailsLengthLimit 30000 -PreviewLineCount 25 + if ($exportedTests.Count -gt 0) { + $updatedAuditResults = Get-ExceededLengthResultDetail -AuditResults $AuditResults -TestNumbersToCheck $TestNumbersToCheck -ExportedTests $exportedTests -DetailsLengthLimit 30000 -PreviewLineCount 25 + } + else { + $updatedAuditResults = $auditResults + } $originalFileName = "$ExportPath\$timestamp`_M365FoundationsAudit.csv" if ($ExportToExcel) { $xlsxPath = [System.IO.Path]::ChangeExtension($originalFileName, '.xlsx') From 168cc386795dfd28ae91138cf7665f43e8d4ca41 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Wed, 26 Jun 2024 09:00:39 -0500 Subject: [PATCH 09/10] docs: Update CHANGELOG --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 2eb0e4b..3e24770 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -8,6 +8,7 @@ The format is based on and uses the types of changes according to [Keep a Change - Fixed test 8.6.1 to include all of the following properties in it's checks and output: `ReportJunkToCustomizedAddress`, `ReportNotJunkToCustomizedAddress`, `ReportPhishToCustomizedAddress`,`ReportJunkAddresses`,`ReportNotJunkAddresses`,`ReportPhishAddresses`,`ReportChatMessageEnabled`,`ReportChatMessageToCustomizedAddressEnabled` - Fixed help `about_M365FoundationsCISReport` examples. +- Fixed `Export-M365SecurityAuditTable` to properly export when nested table tests are not included. ### Changed From 6ed0e239b73371e0a6bea1dcda42ea8e990a7865 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Wed, 26 Jun 2024 09:06:58 -0500 Subject: [PATCH 10/10] docs: Update CHANGELOG --- CHANGELOG.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 3e24770..aaa5b22 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -12,7 +12,7 @@ The format is based on and uses the types of changes according to [Keep a Change ### Changed -- Changed output of failure reason and details for 8.5.3 to be in line with other tests. +- Changed output of failure reason and details for 8.5.3 and 8.6.1 to be in line with other tests. ## [0.1.14] - 2024-06-23